pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Bluetooth technology

Named after a tenth-century Danish king, Bluetooth is a specification for a small form-factor, low-cost radio solution providing links between mobile computers, mobile phones and other portable handheld devices, and connectivity to the internet which it is hoped will revolutionize mobile computing and communications by providing freedom from wired connections. The initiative is backed by leaders in the telecommunications, computing, and network industries – including 3Com, Ericsson, IBM, Intel, Lucent, Motorola, Nokia and Toshiba – and more than 1300 adopter companies. Microsoft’s decision to join the group driving the standard at the end of 1999 significantly increased hopes that one of the problems that had afflicted Bluetooth hitherto – namely that the standard had yet to extend beyond hardware compatibility to encompass the software that runs across it – would not be allowed to undermine the standard to the extent that it had its forerunner, infrared.

Bluetooth’s chief advantage over infrared is that Bluetooth does not require line of sight. Its backers hope the component costs will be so low that it will ultimately replace infrared. Others believe that, although there are clear areas of overlap, IrDA and Bluetooth are complementary with either being the most appropriate for certain applications and intended usage models.

Bluetooth operates in the unlicensed Industrial Scientific and Medical (ISM) 2.4GHz band, ranging from 2.4 to 2.4835 GHz in the US, Japan and Europe. Parts of this band are also available in France and Spain. By using the 2.4 GHz band, Bluetooth Wireless Technology promises to be a universal wireless solution. Essentially, it is the same kind of microwave radio technology that has given us wireless door chimes and automatic garage door openers. It draws heavily on existing wireless LAN technology since it is based around the IEEE’s 802.11 – the existing standard for wireless Ethernet. The main differences are that in order to consume less power, Bluetooth is initially restricted to an operating distance of just 10 metres and a speed of approximately 1 Mbit/s.

Bluetooth isn’t being touted as a replacement for high-speed wired connections like USB or IEEE 1394 but rather as a technology of convenience. The technology will work much like cordless home phone handsets where there are transceivers (portable devices) and base stations. It’ll be possible to operate between eight and ten devices within the same cell, with seven offering data services and three offering voice comms. The catch is that an individual Bluetooth device will actually enjoy an asymmetric data connection – 721 Kbit/s in total, with the up channel running at 56 Kbit/s.

Bluetooth modules have transceivers that transmit or receive data using radio waves. These modules scan for and detect other Bluetooth devices with which to either send or receive data. When Bluetooth devices come within range of each other, they establish contact and form a temporary network called a Personal Area Network (PAN). A network session must be established before any data will be transmitted among devices; for security reasons the user must grant manual networking approval to devices that have not been authorised as companion devices belonging to the same PAN.

In order for two Bluetooth devices to communicate, they must first acknowledge and identify each other. If both devices belong to the same Personal Area Network (PAN) and have been authorized by their user to automatically communicate, then communication is instant. If the devices do not belong to the same PAN, the user must manually approve and initiate the communication. When within range of unrecognized Bluetooth modules, the devices will prompt the user to permit a networking session with the new device. The user can approve or deny the network request. The owner must manually approve communication with a Bluetooth device that has not been approved for communication in that particular PAN.

Bluetooth modules use Frequency-Hopping Spread Spectrum (FHSS) techniques for voice and data transmission. Spread Spectrum communication techniques have been used for many years by the military because of their security capabilities. FHSS uses packet-switching to send data from the transmitter of one Bluetooth module to the receiver of another. Unlike circuit-switching, which establishes a communication link on a certain frequency (channel), FHSS breaks the data down into small packets and transfers it on a wide range of frequencies across the available frequency band. Bluetooth transceivers switch or hop among 79 hop frequencies in the 2.4 GHz band at a rate of 1,600 frequency hops per second. This technique trades off bandwidth, in order to be robust and secure.

A Bluetooth device will contain one or more profiles that will inform other Bluetooth-compliant devices what it is and what it can do. This mechanism allows devices to attempt to synchronize their databases as soon as they recognize each other. The result is that a Bluetooth phone, for example, could automatically create a link to a Bluetooth-enabled PC and Bluetooth wireless earphone. Users would then be able to use the earphone to talk on the phone or use their PC to connect to the Internet through the digital phone – all without wires or setup effort.

Originally slated for availability in Mid-1999, it wasn’t until late 2000 that the first Bluetooth-enabled devices began to emerge. Initial impressions were favourable, with earlier fears that Bluetooth and 802.11 may interfere with each other apparently unfounded and the level of software support appearing to be good. Typically, a Windows Explorer extension – Bluetooth Neighbourhood – shows all of the Bluetooth devices within range, along with a list of services available from the remote devices. The creation of a connection between two Bluetooth PCs involves the dragging of a service icon onto the remote computer’s icon and file-transfer is simply a matter dragging and dropping files from one machine to another within the Bluetooth Neighborhood.

  • GSM Technology
  • GPRS Technology
  • 3G Technology
  • WAP Technology
  • Bluetooth technology
  • GPS Technology
  • Galileo
  • IEEE 802.11b
  • IEEE 802.11a
  • HiperLAN2
  • IEEE 802.11g
  • WiFi Access
  • WiMAX Technology
  • HSDPA
  • IEEE 802.11n

Filed Under: Mobile Communications

Latest Articles

Pentium 4 Memory

Dual-channel memory operation is dependent on a number of conditions being met, Intel specifying that motherboards should default to single-channel mode in the event of any of these being violated: DIMMs must be installed in pairs Both DIMMs must use the same density memory chips Both DIMMs … [Read More...]

DDR SDRAM explained

Double Data Rate DDR) SDRAM is the other competing memory technology battling to provide system builders with a high-performance alternative to Direct RDRAM. As in standard SDRAM, DDR SDRAM is tied to the system's FSB, the memory and bus executing instructions at the same time rather … [Read More...]

Cyber Threat Hunting

What is Cyber Threat Hunting? Cyber Threat Hunting is the practice of proactively searching through computer networks for advanced threats and malicious factors that may have slipped past an SMEs traditional security endpoint. Fortunately, IT support companies like EC-MSP can provide new security … [Read More...]

Revolutionize Your Internet Experience with Orbi 960 – The Ultimate WiFi System

In a world where seamless connectivity is essential, slow and unreliable internet connections are a major problem. Whether you are running a business, … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

WHAT IS CLOUD COMPUTING AND WHAT ARE ITS MAIN BENEFITS?

Users are Increasingly using cloud computing to store their information, which is replacing local storage. The business digitization process goes … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

A Peak at the Lumia 950

Its coming. The new phone from Microsoft, the Luma 950 is due any time now. This will be the flagship Windows phone and Microsoft will be unveiling it … [Read More...]

How to Create Your Own Private VPN

VPN (virtual private network) services have been available online for almost as long as the internet. You probably know the basics by now. In case … [Read More...]

Core i7 2nd Gen

The Core i7 2nd Gen is an example of innovative engineering. Gone are the days when you had to depend on individual plug in cards to avail the … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors